ransomwarespampentestIoTphishingsecurityawarenessCyberSecurityFTPVPNintegrityProofpointresiliencePHIconfidentialitynetworkvirusPIIidentitytheftIOCadminDarkWebCIAtriadbugspoofingbreachencryptionWISPvulnerabilityantivirusdefenseevasioncyberattackBECcryptographywormvishingriskpacketDDoSexploitIDSzero-dayincidentresponseIPHIPAAOSSyssecAdmincomplianceCyberDefensebotnetescalationEDRMFAincidentspywaresecuritypolicyinsiderthreattrainingDefense-in-depthrootkitfirewallsmishingsocialengineeringAPTIPSavailabilitybusinesscontinuityhackerSecurityOperationsriskassessmentpassphrasemalwarepasswordransomwarespampentestIoTphishingsecurityawarenessCyberSecurityFTPVPNintegrityProofpointresiliencePHIconfidentialitynetworkvirusPIIidentitytheftIOCadminDarkWebCIAtriadbugspoofingbreachencryptionWISPvulnerabilityantivirusdefenseevasioncyberattackBECcryptographywormvishingriskpacketDDoSexploitIDSzero-dayincidentresponseIPHIPAAOSSyssecAdmincomplianceCyberDefensebotnetescalationEDRMFAincidentspywaresecuritypolicyinsiderthreattrainingDefense-in-depthrootkitfirewallsmishingsocialengineeringAPTIPSavailabilitybusinesscontinuityhackerSecurityOperationsriskassessmentpassphrasemalwarepassword

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. ransomware
  2. spam
  3. pentest
  4. IoT
  5. phishing
  6. security awareness
  7. Cyber Security
  8. FTP
  9. VPN
  10. integrity
  11. Proofpoint
  12. resilience
  13. PHI
  14. confidentiality
  15. network
  16. virus
  17. PII
  18. identity theft
  19. IOC
  20. admin
  21. Dark Web
  22. CIA triad
  23. bug
  24. spoofing
  25. breach
  26. encryption
  27. WISP
  28. vulnerability
  29. antivirus
  30. defense evasion
  31. cyber attack
  32. BEC
  33. cryptography
  34. worm
  35. vishing
  36. risk
  37. packet
  38. DDoS
  39. exploit
  40. IDS
  41. zero-day
  42. incident response
  43. IP
  44. HIPAA
  45. OS
  46. SyssecAdmin
  47. compliance
  48. Cyber Defense
  49. botnet
  50. escalation
  51. EDR
  52. MFA
  53. incident
  54. spyware
  55. security policy
  56. insider threat
  57. training
  58. Defense-in-depth
  59. rootkit
  60. firewall
  61. smishing
  62. social engineering
  63. APT
  64. IPS
  65. availability
  66. business continuity
  67. hacker
  68. Security Operations
  69. risk assessment
  70. passphrase
  71. malware
  72. password